How do I create a DKIM (Domain Key) record?

Yahoo originally created Domain Keys as an authentication and validation technique for email using a PGP-like protocol. The original specification has since been improved to DKIM (DomainKeys Identified Mail) by the community and a series of IETF standards resulted in RFC 6376. DKIM makes it very easy for a mail server to validate whether an […]

Do you support a 2048 bit (or higher) Domain Key (DKIM)?

More and more organizations are moving from the shorter 384, 512 and 768-bit keys up to 1024 and higher in order to protect against spoofing because the smaller keys are easier to crack. Our DNS system intuitively supports a 2048-bit key and larger. Simply paste it into the TXT record and hit save. Our back-end […]

Resource Record Types

Total Uptime’s Cloud DNS Service supports 27 different DNS resource record types. That includes 26 standard record types and 1 special web-redirect type that we’ve created. Below is a comprehensive list of each record type which you can find in the Cloud DNS management interface. DNS SOA Record This is the “Start of Authority” resource […]

Version 3.4 of our Cloud Platform released

Version 3.4 of our Cloud Platform was released on March 16, 2014. It includes a significant number of new features and enhancements as well as bug fixes. Below is a complete rundown of the changes you’ll see today. New General System/Account Features: Password Reset: Previously, if a user forgot their password and did not have a […]

DNSSEC Implementation Guide

We recently added an easy-to-use implementation of DNSSEC in our UI.  The currently deployed version in our UI makes it nearly impossible to misconfigure.  Every time you make a change, it is queued for review by one of our NOC engineers to ensure that the requested actions will not impact any existing chain of trust. […]

Top External Monitoring Tools in 2019

What is external monitoring? In a general sense, it means regularly checking on something to find out what is happening. It’s a way to gather information. In a large network, it means observing and recording data from a wide variety of devices and applications. We should clarify that monitoring and management are not the same […]

Zero Day Exploit Protection

They say what you don’t know can’t hurt you — but that’s not really true. One example is a zero-day exploit. This is a network vulnerability that hasn’t been identified yet, at least not by the people who need to fix it. These IT professionals have zero days to fix the problem because they don’t […]

Disaster Recovery/Business Continuity

Disaster Recovery & Business Continuity Solutions High Availability is attainable for business of any size. We make it easy to redirect visitors and clients from one location to another. As more and more enterprises, their clients and end-users classify applications as “mission-critical”, the financial risks associated with system downtime continue to escalate. In May 2013, […]

Cloud Availability Platform v18.3.1

Today we officially released a minor update as version 18.3.1 to our cloud platform. The following updates were included in this release: Private IP Ranges: We updated how we handle private IP ranges assigned to customers and VRFs to allow customers to have multiple non-consecutive ranges more easily. WAF Profile Editing: We’ve enhanced the WAF […]

Cloud Availability Platform v18.1.0

Today we released version 18.1.0 of our cloud platform after many months of hard work on our part, and anticipation on yours. While there are over 120 bug fixes, feature enhancements and changes, the biggest change you will see is the new skin. It was time to update the look and feel of the UI, […]